Provide a 1 page analysis while answering the following question: William Faulkner “A Rose for Emily”. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required.

Lecturer Essay # Character analysis of Emily In the short story A Rose for Emily by William Faulkner, the offers insights into the life of Emily Grierson, and her death. Readers get a deep understanding of the people of Jefferson, the fiction al city where the story takes place. The character of Emily is well brought out in the story: her life and how she interacted with the people of Jefferson. Emily is a manipulative and secretive woman, limiting people’s access to her life and identity.

Emily’s controlling and manipulative nature is brought out when she refuses to allow Homer Barron to abandon her. She decided to purchase arsenic poison which she used to kill Homer. It is evident that she wanted to control the life of Homer, the man who attempted to abandon her. Furthermore, in the final section of the story, it is revealed hat Emily is a necrophiliac. In a deeper sense, this further illustrates how Emily wanted to control others. Her attraction to dead bodies simply means that she had the powerful desire to be in total control of others.

The secretive side of Emily is also clear. In her analysis of the story, Renne Curry (1994) argues that Emily was unavailable even to the narrator. Curry notes that there was limited knowledge of Emily, and her life remained a mystery. There was an “extended period of limited knowledge” (Curry, 391). Indeed, in the story, the narrator says that the front door to Emily’s house remained closed for much of her life. In addition, Emily refused to state the reason for buying the arsenic poison, further illustrating her secretive nature.

Emily is also a character who lives in denial. She is reluctant to accept the reality. She is some kind of ‘avatar’ because she does not believe in death (Davis, 35). For instance, when her father died, she refused to admit this fact and went ahead and kept his body. In addition, it can be argued that after she killed Homer, she continued to live in denial by keeping Homer’s body. She is portrayed as a woman who not only resists the passage of time but also resists change (Davis, 38). For example, when numbers were being attached to houses, she did not allow the authorities to attach a number to her house. This is an illustration of how she refused to accept change.

Works Cited

Curry, Renee R.&nbsp. “Gender and authorial limitation in Faulkner’s ‘ A Rose for Emily.’&nbsp.(Special Issue: William Faulkner).”&nbsp.The Mississippi Quarterly&nbsp.47.3 (1994): 391+.&nbsp.Academic OneFile. Web. 15 Feb. 2013.

Davis, William V.&nbsp.“ Another Flower for Faulkner’s Bouquet: Theme and Structure in ‘ A rose for Emily’.” Notes on Mississippi Writers&nbsp.7.2 (Fall 1974): 34-38. Rpt. in&nbsp.Literature Resource Center. Detroit: Gale, 2013.Literature Resource Center. Web. 15 Feb. 2013.

Provide a 2 pages analysis while answering the following question: China’s population policy. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required.

China’s population policy Containing approximately 3 billion people, China makes up one-fifth of the world’s entire population. China’s government decided to enact a population growth policy when they determined that if their population continued to grow at the rate that it was, the country would quickly lose the resources needed to sustain every single person. With too many people, and with many more guaranteed in the near future, China would be unable to live comfortably within the boundaries of its resources. The population growth policy significantly decreases the amount of people living in the country, though there are still considered to be too many.

2. China would face numerous environmental downfalls if they did not enact the population growth policy. The more space that people take up, the less room there is available for farmland and forests, which are vital to the food production of society. Plants and animals become extinct as their homes are torn up to make room for more people. The waste and pollution that come from people would increase, which would affect the habitats of plants and animals. Urban areas would continue to expand, depleting natural resources that humans depend on, such as drinkable water and fossil fuel (Putten, 2010).

3. The greatest benefit that could come of China’s population growth policy is that there would simply be more of everything. There would be more space for people. There would be less need to cut down forests, so there would be more wildlife. Fewer plants and animals would risk becoming extinct. There would be more resources available to everyone. when there are more resources, not only do people not have to worry about surviving, but there would be a greater amount of resources to go around. Also, epidemics would be fewer, there would be less overwhelmed social services, such as health care and education, and fewer people living in poverty. China could become an even more dependent country if they lost the risk of losing their resources to overpopulation. However, a major downfall of China’s policy is that it could lead to an aging population because not enough children are being born (Greenhalgh, 2008). As such, despite the condition they currently are in, China has the potential of facing underpopulation. In the case of underpopulation, they would have too many resources, yet not enough people to pay to for them.

4. China’s policy could scientifically impact the population due to some of the medical procedures undergone to make sure that women do not exceed giving birth to the recommended amount of babies. Abortions and sterilization could gradually deplete China of people. Social impacts on the population primarily surround the lack of females, given the Chinese preference to males. By 2020, there will be approximately thirty million more men than women. This can lead to social instability and courtship-motivated emigration, which involves men moving out of China in search for a female partner (Griffiths, 2007). This may further decrease the population, but it can cause damage to the economy.

5. The United States is currently the third country with the largest population at under three and a half million people, which is significantly less than China. The area of the United States is also slightly larger than the area of China. However, the United States is facing its own issues as the quality of life declines in association with population growth. It may not be as noticeable as the situation in China, but if the United States does not do implement another plan before the population gets completely out of control, there is the chance that it will have to turn to a policy like the one China is currently using.

References

Greenhalgh, S. (2008). Just one child: Science and policy in Dengs China. Berkeley: University of California Press.

Griffiths, D. (2007, January 12). Chinese facing shortage of wives. BBC News. Retrieved November 9, 2011, from http://news.bbc.co.uk/2/hi/asia-pacific/6254763.stm

Putten, J. (2010). Moral Issues and concerns about Chinas one-child policy. New York: Verlag Publishers.

write an article on Chicago Merchandise Mart. It needs to be at least 3500 words.

The building houses the Chicago Tech Startup Center. Massive in its structure, and has served as a monument up to the early 20th century, the landmark of the art deco anchors the skyline at the Chicago River junction. With its upper levels covered with colored floodlights, the building stands out opposite the dark parts of the town in the night views. The structure is the leading outlet for retailing and the whole selling of goods and services in Chicago. The Mart is vast to the extent that by the year 2008, it had its ZIP Code, which is 60654. The environs now share the ZIP Code (Zimmerman 63). In 2010, the Mart launched its Design Center Showrooms and was made available to the public. this had never been done before. Hence, many people have experienced the unique taste of architecture that was used in crafting and building of the Chicago Merchandise Mart on regular visits to the Design Showrooms.

On August 16, 1928, James Simpson, and the Chicago Plan Commission chair, along with a renowned architect, Ernest Graham, turned the initial shovels to mark the beginning of the construction (The Merchandise mart). Simpson was the president of the Marshall Field & Co., and his tenure was from 1923 to 1930 while Chairmans was between 1926 and 1935. John Griffins & Sons, the general contractor, adopted the machine era by using the techniques that were often and ordinarily used during the construction of larger dams. Cement was brought by boats and was always lifted to the bins that stood at 75 feet or 20 m above the level of the ground using compressed air (History – The Merchandise Mart). The gravel and the sand utilized in the construction of this historical monument were taken to the building site via delivery railroad vehicles and conveyor belts. The sand and gravel would then be transferred using numerous elevators that had been deployed at the construction site.

The wet concrete was provided by colossal mixers in order to skip hoists within the vertical towers which were always being extended with the rising height of the building. The construction of the Mart began by employing about 2,500 laborers to work at the site. The trend of recruiting more laborers continued to the point where there were approximately 5,700 workers. During the Great Depression that rocked the economy of the United States of America, the construction of the Chicago Merchandise Mart endured the one and a half years of economic crisis as well within that time.

Create a 2 pages page paper that discusses myspace (& other social network sites) predator problems–how can they be solved.

Online Predators Online Predators and how they can be solved With the development of modern technology and increased use of internet, the world has become a global village. Use of internet and computers has eased the rate at which people communicate and interact than ever before. Different social network sites such as MySpace, Facebook, and Twitter among many others are developed with the sole purpose of ensuring that friends and relatives stay connected (Hansen, 2008). However, these sites have been faced with one problem- predators- which have raised concerns all over the world.

While social network sites are aimed at networking and being in touch with relatives and friends, the bottom line is that social networking is highly famous and it is a big business today. Unluckily, scam artists, child molesters, and sexual predators have noticed that these sites can also be exploited to find victims. MySpace is one of the sites where predator is a big problem. MySpace is a social networking site just like facebook. However, there have been numerous cases of sexual predators and child molesters posing as children to network with young victims on MySpace (Zilney & Zilney, 2009). Recently, MySpace was also discovered to be compromised by attackers spreading malware on exploited profile sites. These have led to MySpace taking steps and implementing security measures to minimize this problem though users are still supposed to be cautious and aware. Predators were therefore a big problem to MySpace not only because it led to increased cases of sexual assaults but also death cases were on high rate.

Nevertheless when putting into consideration increased cases of predators. social networking sites have employed numerous efforts to cut down on the numbers of predators online. For instance, they have developed an e-mail registry that would permit parents to prohibit their children creating online profile for such networks. Social networking sites would also create the default profile setting for 16 and 17-year-olds on their site “confidential “ so that they can only be contacted by individuals they know hence making it difficult for predators to find them (Krinsky, 2008).

According to Hansen (2008), they employ a third party to gather a registry of email addresses offered by parents who want to restrict access of their children to the websites, and will block anyone using email address listed in the registry from signing up or creating a user profile. Laws have also been implemented to govern and address this issue and all networking sites have agreed to comply with them and cooperate with the government to sue people who are revealed to have broken these laws. These sites have also created a tab where users can report any incidence of abuse. Hansen (2008) asserts that this has made it easy to report and locate predators since it is only one click away to report incidence of abuse. Lastly, all networking sites are encouraging parents to make sure that they scrutinize whatever their kids are doing or who they are interacting with on these sites. They should also educate them on the existence of predators and let them know that predators exist hence need of being careful when using these sites.

In general, it is apparent that predators are a very big problem not only to MySpace but all other networking sites. Therefore, as far as these sites have been doing their best to end this, everybody across the globe is supposed to be aware and offer the best they can to ensure that this comes to an end. This is because everybody is affected by this issue when considering that social networking sites are used across the globe. Governments should also be alert and implement additional laws in addition to ones in existence so as to ensure that users of these sites are completely safeguarded from predators.

References

Hansen, C. (2008). To Catch a Predator: Protecting Your Kids from Online Enemies Already in Your Home. New York: Penguin Group USA.

Krinsky, C. (2008). Moral panics over contemporary children and youth. New York: Ashgate Publishing, Ltd.

Zilney, L. and Zilney, L. (2009). Perverts and predators: The making of sexual offending laws. New York: Rowman & Littlefield.

prepare and submit a paper on effects of the key discoveries in science since 1800.

The paper will seek to investigate the effects of three scientific discoveries on the world. These are the discovery of practical electricity generation by Alessandro Volta in 1800, the discovery of the neutron by Professor James Chadwick in 1932, and the discovery of induced pluripotent stem cells by Dr Shinya Yamanaka in 2007.

Alessandro Volta was credited for the creation of the voltaic pile in the year 1800, which led him to discover the first practical way to generate electric current. According to Schlesinger (2010), this discovery also led to Volta’s later discoveries in pneumatics, meteorology, and electrostatics. This discovery had a worldwide impact since it allowed for the invention of the battery and electrophorus, which are crucial in the powering and construction of mobile devices that today’s society is so dependant. In fact, so important was the discovery that the basic unit of electromotive force produced by batteries, or the volt, is named after him. Volta’s invention of the voltaic pile, which came later to be referred to as the battery, was crucial in later inventions of the capacitor, which enables the working of most electrical devices. The electric battery created by Alessandro Volta was one of the most important discoveries of the 19th century and has had widespread use in later centuries. According to Piccolino & Bresadola (2013), the battery enabled scientists to come up with new ideas in the electric field, which set off for the second time an electrical era.

Today, Hurst et al. (2012) contend, batteries have become inseparable with various fields, including transportation, entertainment, medical science, and in the home. In the home, for example, people utilize batteries for their computers, iPods, iPods, electronic games, radios, as well as watches, all on a regular basis.

c in c programming language using the same func and pointers

Answer all Questions For each of the following questions, you can find: 1. Description of the requirements. 2. Testing example(s). 3. Function prototype that you should write your code inside it. The function already declared and defined in the given start-up code. 4. Helper function(s), if any, that can be used in the solution. 5. Evaluation marks. Q 1 Find Occurrences Name: focc Description: • This command should search for the given substring in string and then return the number of occurrences of this substring if found or zero if not found. • is sample statement • contains a character or more that we need to find the number of its occurrences in Notes: • The given string contains multiple words separated by underscore; i.e. the underscore acts here exactly as if spaces exist between words • The substring is not necessary be exist in the given string and in this case return 0 Example: FOS> focc hello_world ld ➔ 1 (hello_world) FOS> focc hello_world l ➔ 3 (hello_world) FOS> focc hello_world_o_w o_w ➔ 2 (hello_world_o_w) FOS> focc hellohellohellohello lo ➔ 4 (hellohellohellohello) FOS> focc operating_systems ss ➔ 0 (Not exist) FOS> focc defenselessness ss ➔ 2 (defenselessness) FOS> focc ppppppp pp ➔ 3 (ppppppp) Page 2 of 5 Function: Your code MUST be written inside the following function: int FindNoOcc(int num_of_args, char** arguments) 1. arguments[1]: A string 2. arguments[2]: A substring we need to find the number of its occurrences Return: Number of occurrences of the given substring in a sample input string Evaluation: a) Correct code logic [2 marks] b) Successful run [3 marks] [Q1 Total: 5 marks] Q 2 Calculate Array Variance Name: cav Description: • This command should calculate the variance ( 2 ) of the elements in the given , according to the following equation: = 2 () = ∑ ([] − ()) 2 −1 =0 Where: ▪ N: array size ▪ (): is the mean (average) of the array elements: = () = ∑ [] −1 =0 • NOTEs: 1. use integer data types (no float, no double) 2. cnia is already implemented inside the given code Example: FOS> cnia x 3 10 20 30 FOS> cnia y 4 400 400 FOS> cav x //should print 66 FOS> cav y //should print 40,000 Page 3 of 5 Function: Your code MUST be written inside the following function: int CalcArrVar(char** arguments) arguments[1]: array name Helper Functions: • strcmp(const char *p, const char *q): to compare string p to string q Evaluation: a) Correct code logic [2 marks] b) Successful run [3 marks] [Q2 Total: 5 marks] Q 3 Count free pages inside a table Name: cfpDescription: This command should count the number of free pages inside the given. A free page is the one that’s not connected to any frame. If the table is not exists, you should return -1. Example: FOS> cfp 960 (number of free pages inside table # 960 = 0) FOS> cfp 0 (table is not exists, it should return -1) Function: Your code MUST be written inside the following function: int CountFreePagesInTable(char** arguments) 1. arguments[1]: table number Return: 2. If table exists, return number of free pages. 3. Else, return -1. Page 4 of 5 Evaluation: a) Correct code logic [2 marks] b) Successful run [3 marks] [Q3 Total: 5 marks] Q 4 Count modified pages in a virtual range Name: cmps Description: This command should count the number of modified pages inside the given virtual range [, ). Example: FOS> cmps F0000000 F0005000 ➔ (no modified pages in this range) FOS> wum 0xF0000000 A ➔ write ‘A’ at F0000000 (1st page in the range) FOS> wum 0xF0000005 B ➔ write ‘B’ at F0000005 (still in the 1st page) FOS> wum 0xF0003000 C ➔ write ‘C’ at F0003000 (4th page in the range) FOS> wum 0xF0004FFF D ➔ write ‘D’ at F0004FFF (last byte in the 5th page in the range) FOS> cmps F0000000 F0005000 ➔ (num of modified pages in this range = 3) FOS> wum 0xF0005000 X ➔ write ‘X’ at F0005000 (page outside the range) FOS> cmps F0000000 F0005000 ➔ (num of modified pages in this range = 3) Function: Your code MUST be written inside the following function: int CountModifiedPagesInRange(char** arguments) 1. arguments[1]: start virtual address of the range (in HEX) 2. arguments[2]: end virtual address of the range (in HEX) Page 5 of 5 Return: 3. number of modified pages in the given range Helper: 1. You may need to use PERM_MODIFIED 2. There’s a constant in the code called “PAGE_SIZE” which equal to 4KB 3. You can use “ROUNDDOWN” and “ROUNDUP” functions, described below in order to round the virtual addresses on multiple of PAGE_SIZE (4 KB) Function Description Defined in… ROUNDUP (value, align) Rounds a given “value” to the nearest upper value that is divisible by “align”. Inc/types.h ROUNDDOWN (value, align) Rounds a given “value” to the nearest lower value that is divisible by “align”. Inc/types.h Evaluation: a) Correct code logic [2 marks] b) Successful run [3 marks] [Q4 Total: 5 marks] Wishing to you all the best

Which social problem was Jacob Riis addressing through his work? How did he communicate the severity of this problem?

 Which social problem was Jacob Riis addressing through his work?  How did he communicate the severity of this problem?

Identify a recent change in your organization or in an organization with which you are familiar. Briefly describe the role of human resources in the implementation of the change.

To complete this Assignment, review the learning resources for this week and create a Q & A Reference Sheet that includes questions and answers that cover the following bullets in a 2 page document.

  • Identify a recent change in your organization or in an organization with which you are familiar.
  • Briefly describe the role of human resources in the implementation of the change.
  • Explain one change management strategy that was used (or could have been used) and your rationale for why it is important.
  • Explain the HR responsibility for communication and employee support in the change management process.
  • Your Assignment must include 3 references to support your thinking.

APA Format

Provide a 5 pages analysis while answering the following question: Informal exchange networks, made possible through different processes of social relations, permeate the formal system in all levels which

Provide a 5 pages analysis while answering the following question: Informal exchange networks, made possible through different processes of social relations, permeate the formal system in all levels which facilitates the flow of goods. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. However, her general idea about people’s complex global interaction would actually suffice common understanding on why informal exchange is not hard to penetrate into any formal designed system intended for any ideal activity.

A good way to start the argument in this paper is to first understand globalization with reference to its wide range of context. It is evident that substantial arguments are available in order to prove that globalization could be considered as a process in which people around the world are interconnected in different ways even considering larger distance (Lechner, 2009). Perhaps, the common understanding about it is that it substantially shaped the world. However, Nordstrom (2007) offered her own point of view regarding this matter providing her essential arguments which include the point that it is the people who actually shaped globalization and not the other way around. In what way do people formed globalization is an interesting subject Nordstrom emphasizes in her book entitled “Global Outlaws: Crime, Money, And Power in the Contemporary World.” Interconnection among everybody is therefore a significant point that one needs to take into account regarding the matter about forming significant networks to ensure a simple until a wide range of interconnectivity. Based on the idea of Nordstrom, if people create globalization which according to Lechner involves interconnection, then joining onto one another must have substantially originated among those who involved themselves with the network. From the simplest down to complex interconnection, Nordstrom believes that everything is possible just to ensure effective formation of networks that could have significant implication on obtaining power, profit and productivity within the bound of social, cultural, political and economic issues (Nordstrom, 2007).

write an article on The educator as a public intellectual.

Hello, I am looking for someone to write an article on The educator as a public intellectual. It needs to be at least 1750 words. In principle, teachers are the second guide and protector after the parent. Significantly, they mold the child by introducing him/her to the foundations of education and making the student conversant with how to interact with others. Similarly, teachers’ contributions to society are by molding and developing the future generation in accordance with the social and cultural structures of the given community. For instance, it is the role of teachers to provide moral and intellectual leadership to the youth by preparing them to be critical thinkers and active citizens in society.

Significantly, life is a journey encompassing experience and knowledge gained. Therefore, one meets individuals who build their characters and adds some benefits to their lives as a whole. For instance, too many people in Baltimore Mr. Jim Beglin are nothing short of a public intellectual. Furthermore, being a sociology teacher Mr. Beglin has been able to enlighten the students on the need for better social behavior, planning, and political consciousness. Therefore, with Mr. Beglin as their educator students at Bishop Walsh School have been able to quench their thirst for knowledge while at the same time get to be influenced by right living subscribing to the conscious doctrine of life.

Mr. Beglin subscribes to the philosophy of integrity, and hard work pays off. In essence, by equipping and always reminding his students of the need to be true to themselves and only rely on what one has worked for has improved the students’ behavior and attitude to an admirable level. Therefore, through motivating his students and assuring them of the significant benefits that accrue to an individual, who strives to earn and live on his/her sweat. Significantly, this doctrine has been spread to how the students carry themselves and act in society, hence influencing even more members of the community.